Resources

Blog

The Pros and Cons of Scripting

There are pros and cons to evaluate when it comes to relying on scripts. Scripting can definitely have some perks depending on its application. However, it’s important to weigh these against the benefits of a full managed file transfer (MFT) solution to make sure you’re making the best decision for your business over the long term.
On-Demand Webinar

How to Control Your Data and Stay Compliant with Robotic Process Automation

Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation (RPA) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable. Watch our on-demand...
Datasheet

Powertech Compliance Monitor for IBM i

Compliance Monitor gathers a broad set of audit and security data from your Power Systems™ running IBM i. Schedule a demo today.
Article

Managing Your IBM i Audit Data

Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
On-Demand Webinar

Best Practices for Avoiding Network Outages

The financial ramifications of technological failure for a business can be devastating. If your company's infrastructure fails you can potentially lose business, customers, and even your reputation. Proactively monitoring your network can ensure this doesn't happen.
Case Study

How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation

What if you could reduce an eight-hour outage… to no time at all? That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog

PCI Compliance Takeaways from the Target Data Breach

Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

    The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Guide

Self-Audit: Checking Assumptions at the Door

Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions. How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already? In the quest to get better sleep, it is a good idea to self-audit your...